Vulnerability Scan Dashboard
The Vulnerability Scan Dashboard provides a comprehensive view of your organization’s vulnerability status, helping you track and manage risks associated with known vulnerabilities (CVEs). This dashboard is organized into multiple sections to enable quick analysis and decision-making regarding vulnerability mitigation.
- User Manual
- Agents
- The Cyber Risk Assessment Process
- API Documents
- General Questions and Troubleshooting
- The Cyber Risk Assessment Process (Video Tutorials)
- Sales and Prospecting Articles
- CYRISMA Partner Portal Access
- Glossary
- CYRISMA Change Log
- Support Ticket SLA
- Onboarding Framework
- PSA Integrations
- Billing Questions
- Self Onboarding Guide
Table of Contents
Vulnerability Risk Grade
The Vulnerability Risk Grade displays the overall risk level based on the number and severity of vulnerabilities detected during scans. The primary grade shown corresponds to the current reporting period (e.g., Month or Quarter), while a smaller grade below represents the previous period, providing a quick comparison of improvement or decline.
This section helps assess the effectiveness of your vulnerability management over time by displaying the progress in reducing risk levels.

Vulnerability Trend Chart
The Vulnerability Trend Chart offers a historical view of the vulnerabilities discovered in your environment, segmented by severity levels over different time intervals. This allows you to analyze trends in vulnerability discovery and remediation efforts over time.
- Time Filter: Use the W (Week), M (Month), Q (Quarter), or Y (Year) options at the top-right corner to select the time period for the trend chart.
- Severity Filter: Each severity level (Low, Medium, High, Critical) can be toggled on or off by clicking the respective legend item. This feature enables focused analysis on specific vulnerability severities.

Top 5 Vulnerability Profiles
The Top 5 Vulnerability Profiles table shows the most commonly identified operating systems or software with vulnerabilities. For each profile, it displays:
- Uses: The number of instances of each profile found across your network.
- Devices: The number of unique devices running each profile.
This section helps prioritize mitigation efforts based on the frequency of vulnerable profiles in your environment.

Targets with the Most Vulnerabilities
The Targets with the Most Vulnerabilities section lists the top 10 assets with the highest number of vulnerabilities. This section ranks each target by the number of critical, high, medium, and low vulnerabilities detected.
By focusing on targets with the most vulnerabilities, you can prioritize remediation actions on assets that present the greatest risk.

All Vulnerabilities with Impacted Hosts
In the All Vulnerabilities section, a detailed breakdown of CVEs detected in your environment is displayed, segmented by impact on workstations and servers.
- Unique CVE Breakdown: This chart displays the number of unique CVEs affecting workstations and servers, categorized by severity. The "Total Unique" value counts each CVE once, even if it impacts both workstations and servers.
- Unique CVE Breakdown by Timespan: This chart categorizes vulnerabilities based on their age, with time spans ranging from zero-day (recently discovered) to more than a year old.
The Root Cause Analysis button in this section allows you to investigate the underlying causes of vulnerabilities. By clicking this button, you can view detailed root causes and, in some cases, apply updates directly through the CYRISMA interface to address these vulnerabilities.

Open Ports Summary
The Open Ports Summary provides insights into the network ports that are currently open on devices within your environment. This section highlights:
- Port Number: The specific port that is open.
- Port Name: The associated protocol or service.
- Risk Level: The risk level associated with each open port, which could range from low to high based on security implications.
- No. of Machines: The number of devices on which each port is open.
By analyzing open ports, you can identify potentially unnecessary or risky network services that may need to be closed or restricted.

Active Vulnerability Scans
This section shows Active Vulnerability Scans in progress for your organization, displaying each scan’s status and percentage of completion. This enables real-time monitoring of ongoing scanning activities.

Last 5 Vulnerability Scans
The Last 5 Vulnerability Scans table lists the most recent scans performed in your environment. Each entry includes:
- Scan Name: The name of the scan.
- User Name: The user who initiated the scan.
- Scan Start: The start time of the scan.
- Scan Finish: The completion time.
This section provides quick access to recent scan results, helping you stay updated on vulnerability assessments.
Scheduled Vulnerability Scans
The Scheduled Vulnerability Scans table shows all planned vulnerability scans, including:
- Scan Name: The name given to the scheduled scan.
- Type: Specifies if it is a one-time or recurring scan.
- Next Scan Date: The next date and time the scan is set to run.
- Targets: The number of assets targeted for each scan.
This section helps ensure that scans are scheduled at appropriate intervals, supporting ongoing vulnerability management efforts.

Mitigation Plans in Progress
The Mitigation Plans in Progress section lists vulnerability mitigation plans that are actively being addressed. For each plan, it displays:
- Plan Name: The name of the mitigation plan.
- Assigned To: The user responsible for executing the mitigation plan.
- Progress: A progress bar indicating the completion percentage of each plan.
This section provides visibility into the status of active mitigation efforts, ensuring that high-risk vulnerabilities are being addressed efficiently.
